Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 08:10
Static task
static1
Behavioral task
behavioral1
Sample
0064a5e1fb383f45293db229e.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0064a5e1fb383f45293db229e.dll
Resource
win10v2004-20230703-en
General
-
Target
0064a5e1fb383f45293db229e.dll
-
Size
5.0MB
-
MD5
7f429a8e660c28fa4465412a37fa4a4e
-
SHA1
153b73e368b2e2355fa7999b053068cd8859b771
-
SHA256
0064a5e1fb383f45293db229eacb793dce0e9a94a40778307b012f1c4c062b6b
-
SHA512
2e622930fc3779f5ec5c9d9b6fda047d1a9e8781a39d25403f7a2e4b2e468badc0cd53f7624865fe6ce5bf2001030ac1e83c98b6fc8f3f251bcf7ad7648c00fd
-
SSDEEP
49152:RnNQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA:1WqPoBhz1aRxcSUDk36SA
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3038) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 2 IoCs
pid Process 4808 mssecsvr.exe 4324 mssecsvr.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe mssecsvr.exe File created C:\WINDOWS\mssecsvr.exe rundll32.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mssecsvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mssecsvr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2840 3068 rundll32.exe 86 PID 3068 wrote to memory of 2840 3068 rundll32.exe 86 PID 3068 wrote to memory of 2840 3068 rundll32.exe 86 PID 2840 wrote to memory of 4808 2840 rundll32.exe 87 PID 2840 wrote to memory of 4808 2840 rundll32.exe 87 PID 2840 wrote to memory of 4808 2840 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0064a5e1fb383f45293db229e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0064a5e1fb383f45293db229e.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4808
-
-
-
C:\WINDOWS\mssecsvr.exeC:\WINDOWS\mssecsvr.exe -m security1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5defbf75977b0d61f8b2ee2e8cb91e1b5
SHA11c70b5b82eb25eda963a1d027175f90c3092c060
SHA25671f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893
SHA512e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2
-
Filesize
2.2MB
MD5defbf75977b0d61f8b2ee2e8cb91e1b5
SHA11c70b5b82eb25eda963a1d027175f90c3092c060
SHA25671f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893
SHA512e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2
-
Filesize
2.2MB
MD5defbf75977b0d61f8b2ee2e8cb91e1b5
SHA11c70b5b82eb25eda963a1d027175f90c3092c060
SHA25671f62cd566bcc16dd3170efc888da5cd12be3910894e64efa5dd10d5405fc893
SHA512e9af6452549d29d68407f094c97d9ffa1ea6257fde3e952646478fd19f129f4f4445046eab15899a320b46a8713b3da08e37af0de08ae357c9ba2e57365b0bf2